{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T23:56:15Z","timestamp":1772927775676,"version":"3.50.1"},"reference-count":19,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2026,3,1]]},"DOI":"10.1587\/transfun.2025cip0006","type":"journal-article","created":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:11:41Z","timestamp":1753395101000},"page":"349-361","source":"Crossref","is-referenced-by-count":0,"title":["Card-Based Arithmetic Operations Using Integer Commitments and Their Application to Statistical Data Aggregation"],"prefix":"10.1587","volume":"E109.A","author":[{"given":"Shun","family":"ODAKA","sequence":"first","affiliation":[{"name":"Chiba Institute of Technology"}]},{"given":"Yuichi","family":"KOMANO","sequence":"additional","affiliation":[{"name":"Chiba Institute of Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] B. Den Boer, \u201cMore efficient match-making and satisfiability the five card trick,\u201d Jean-Jacques Quisquater and Joos Vandewalle, editors, Advances in Cryptology\u2006\u2014\u2006EUROCRYPT\u201989, volume 434 of LNCS, pp.208-217, Springer, Berlin, Heidelberg, 1990. 10.1007\/3-540-46885-4_23","DOI":"10.1007\/3-540-46885-4_23"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] R. Gradwohl, M. Naor, B. Pinkas, and G.N. Rothblum, \u201cCryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles,\u201d Theory Comput. Syst., vol.44, no.2, pp.245-268, 2009. 10.1007\/s00224-008-9119-9","DOI":"10.1007\/s00224-008-9119-9"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] A. Koch, \u201cThe landscape of security from physical assumptions,\u201d 2021 IEEE Information Theory Workshop (ITW), Los Alamitos, CA, USA, pp.1-6, IEEE, 2021. 10.1109\/itw48936.2021.9611501","DOI":"10.1109\/ITW48936.2021.9611501"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] Y. Komano and T. Mizuki, \u201cCard-based zero-knowledge proof protocol for pancake sorting,\u201d Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, G. Bella, M. Doinea and H. Janicke, eds., vol.13809 of LNCS, pp.222-239, Springer, Cham, 2023. 10.1007\/978-3-031-32636-3_13","DOI":"10.1007\/978-3-031-32636-3_13"},{"key":"5","unstructured":"[5] S. Meinck, \u201cComputing sampling weights in large-scale assessments in education,\u201d Survey Insights: Methods from the Field, Weighting: Practical Issues and \u2018How to\u2019 Approach, Retrieved, 2015."},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] D. Miyahara, Y. Hayashi, T. Mizuki, and H. Sone, \u201cPractical card-based implementations of Yao\u2019s millionaire protocol,\u201d Theor. Comput. Sci., vol.803, pp.207-221, 2020. 10.1016\/j.tcs.2019.11.005","DOI":"10.1016\/j.tcs.2019.11.005"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] T. Mizuki and H. Shizuya, \u201cComputational model of card-based cryptographic protocols and its applications,\u201d IEICE Trans. Fundamentals, vol.E100-A, no.1, pp.3-11, Jan. 2017. 10.1587\/transfun.e100.a.3","DOI":"10.1587\/transfun.E100.A.3"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] T. Mizuki and H. Sone, \u201cSix-card secure AND and four-card secure XOR,\u201d Frontiers in Algorithmics, X. Deng, J.E. Hopcroft, and J. Xue, eds., vol.5598 of LNCS, pp.358-369, Springer, Berlin, Heidelberg, 2009. 10.1007\/978-3-642-02270-8_36","DOI":"10.1007\/978-3-642-02270-8_36"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] A. Nishimura, Y. Hayashi, T. Mizuki, and H. Sone, \u201cPile-shifting scramble for card-based protocols,\u201d IEICE Trans. Fundamentals, vol.E101-A, no.9, pp.1494-1502, Sept. 2018. 10.1587\/transfun.e101.a.1494","DOI":"10.1587\/transfun.E101.A.1494"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] K. Nuida, \u201cEfficient card-based millionaires\u2019 protocols via non-binary input encoding,\u201d Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, J. Shikata and H. Kuzuno, eds., vol.14128 of Lecture Notes in Computer Science, pp.237-254, Springer, 2023. 10.1007\/978-3-031-41326-1_13","DOI":"10.1007\/978-3-031-41326-1_13"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] S. Odaka and Y. Komano, \u201cCard-based arithmetic operations and application to statistical data aggregation,\u201d Innovative Security Solutions for Information Technology and Communications - 17th International Conference, SecITC 2024, vol.15595 of Lecture Notes in Computer Science, pp.118-134, Springer, 2025. 10.1007\/978-3-031-87760-5_10","DOI":"10.1007\/978-3-031-87760-5_10"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] S. Ruangwises, \u201cTwo standard decks of playing cards are sufficient for a ZKP for Sudoku,\u201d 2021.","DOI":"10.1007\/978-3-030-89543-3_52"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] S. Ruangwises, \u201cUsing five cards to encode each integer in \u2124\/6\u2124,\u201d Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, P.Y.A. Ryan and C. Toma, eds., vol.13195 of Lecture Notes in Computer Science, pp.165-177, Springer, 2021. 10.1007\/978-3-031-17510-7_12","DOI":"10.1007\/978-3-031-17510-7_12"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] S. Ruangwises and T. Itoh, \u201cSecurely computing the <i>n<\/i>-variable equality function with 2<i>n<\/i> cards,\u201d Theor. Comput. Sci., vol.887, pp.99-110, 2021. 10.1016\/j.tcs.2021.07.007","DOI":"10.1016\/j.tcs.2021.07.007"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] T. Sasaki, D. Miyahara, T. Mizuki, and H. Sone, \u201cEfficient card-based zero-knowledge proof for Sudoku,\u201d Theor. Comput. Sci., vol.839, pp.135-142, 2020. 10.1016\/j.tcs.2020.05.036","DOI":"10.1016\/j.tcs.2020.05.036"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] K. Shinagawa, T. Mizuki, J. Schuldt, K. Nuida, N. Kanayama, T. Nishide, G. Hanaoka, and E. Okamoto, \u201cCard-based protocols using regular polygon cards,\u201d IEICE Trans. Fundamentals, vol.E100-A, no.9, pp.1900-1909, Sept. 2017. 10.1587\/transfun.e100.a.1900","DOI":"10.1587\/transfun.E100.A.1900"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] Y. Suga, \u201cA card-based protocol that lets you know how close two parties are in their opinions (agree\/disagree) by using a four-point likert scale,\u201d Applied Cryptography and Network Security Workshops - ACNS 2023, Lecture Notes in Computer Science, vol.13907, pp.716-721. Springer, 2023. 10.1007\/978-3-031-41181-6_46","DOI":"10.1007\/978-3-031-41181-6_46"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] K. Takashima, Y. Abe, T. Sasaki, D. Miyahara, K. Shinagawa, T. Mizuki, and H. Sone, \u201cCard-based protocols for secure ranking computations,\u201d Theor. Comput. Sci., vol.845, pp.122-135, 2020. 10.1016\/j.tcs.2020.09.008","DOI":"10.1016\/j.tcs.2020.09.008"},{"key":"19","unstructured":"[19] T. Kuzuma, et al., \u201cSIG technical report,\u201d IPSJ, 2024-CSEC-104(40), pp.1-8, 2024 (in Japanese)."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E109.A\/3\/E109.A_2025CIP0006\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:10:58Z","timestamp":1772856658000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E109.A\/3\/E109.A_2025CIP0006\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,1]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2025cip0006","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,1]]},"article-number":"2025CIP0006"}}